LockBit 3.0 Ransomware Victim: ipsenlogistics[.]com
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
LockBit 3.0 Ransomware NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content...
Medusa Locker Logo NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the...
The financially motivated threat actor known as UNC3944 is pivoting to ransomware deployment as part of an expansion to its...
A novel cloud-native cryptojacking operation has set its eyes on uncommon Amazon Web Services (AWS) offerings such as AWS Amplify,...
Microsoft on Monday said it took steps to correct a glaring security gaffe that led to the exposure of 38...
When you roll out a security product, you assume it will fulfill its purpose. Unfortunately, however, this often turns out...
Software development company Retool has disclosed that the accounts of 27 of its cloud customers were compromised following a targeted...
A new analysis of the Android banking trojan known as Hook has revealed that it's based on its predecessor called...
The suspected Pakistan-linked threat actor known as Transparent Tribe is using malicious Android apps mimicking YouTube to distribute the CapraRAT...
The China-linked threat actor known as Earth Lusca has been observed targeting government entities using a never-before-seen Linux backdoor called...
XWorm is a relatively new representative of the remote access trojan cohort that has already earned its spot among the...
As the adoption of generative AI tools, like ChatGPT, continues to surge, so does the risk of data exposure. According...
New research has found that close to 12,000 internet-exposed Juniper firewall devices are vulnerable to a recently disclosed remote code...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating to the content of the files...
NAME__________Discourse denial of servicePlatforms Affected:Discourse Discourse 3.1.0.beta8 Discourse Discourse 3.1.0Risk Level:6.5Exploitability:UnprovenConsequences:Denial of Service DESCRIPTION__________Discourse is vulnerable to a denial of...
NAME__________Booster for WooCommerce plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Booster for WooCommerce Plugin for WordPress 3.0.2Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Booster for...
NAME__________Feeds for YouTube Plugin for WordPress cross-site scriptingPlatforms Affected:WordPress Feeds for YouTube Plugin for WordPress 2.1Risk Level:6.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________Feeds for...
NAME__________OpenKnowledgeMaps cross-site scriptingPlatforms Affected:OpenKnowledgeMaps Head Start 7Risk Level:5.4Exploitability:HighConsequences:Cross-Site Scripting DESCRIPTION__________OpenKnowledgeMaps is vulnerable to cross-site scripting, caused by improper validation of...
NAME__________NCR Teller web app cross-site scriptingPlatforms Affected:NCR Teller Web App 4.4.0Risk Level:7.2Exploitability:HighConsequences:Gain Access DESCRIPTION__________NCR Teller web app is vulnerable to...